Juniper NETWORK AND SECURITY MANAGER 2010.3 - ADMINISTRATION GUIDE REV1 Administration Manual page 1003

Table of Contents

Advertisement

DMZ-Dual-Untrust port mode........................................109
DNS
defined............................................................................829
refreshing entries.........................................................299
domain
setting a Log Viewer filter for..................................760
domains
about...................................................................................61
defined............................................................................829
global domain login.......................................................74
viewing domain details...............................................90
downed device
e-mail notification......................................................786
DSCP class selector............................................................450
Dual Routing Engines
configuring.....................................................................234
Dual-Untrust port mode....................................................106
E
e-mail notification
downed device.............................................................786
Endpoint Security Assessment Plug-ins.....................276
entitlement See subscription
error icon....................................................................................191
ESAP See Endpoint Security Assessment Plug-ins
ethernet statistics
device-specific view, described.............................658
Ethernet statistics................................................................740
viewing............................................................................665
Ethernet statistics, viewing..............................................665
events
atomic updating............................................................741
EX Series devices
activating with dynamic IP address......................136
activating with static IP address............................134
adding multiple with discovery rules....................166
configuring......................................................................195
importing with dynamic IP address.......................124
importing with static IP address..............................116
supported switches.......................................................19
EX Series switch predefined log views..........................747
EX Switch reports................................................................800
EX-Switch reports...............................................................806
Exempt Rulebase
Adding.............................................................................484
exempt rulebase
adding to security policy..........................................484
Copyright © 2010, Juniper Networks, Inc.
exempt rules
configuring attacks.....................................................485
configuring from the Log Viewer...........................486
configuring match columns....................................485
configuring source and destination.....................485
entering comments...................................................486
expanded VPN view..................................................544, 576
exporting log entries
from device.....................................................................733
from device to e-mail.................................................735
from device to NSM....................................................736
from device to SNMP..................................................741
from device to syslog..................................................742
from device to WebTrends.......................................743
from device, self log entries.....................................735
from GUI Server to CSV.............................................787
from GUI Server to e-mail........................................788
from GUI Server to script..........................................789
from GUI Server to SNMP.........................................787
from GUI Server to syslog.........................................787
from GUI Server to XML............................................788
from GUI Server, about..............................................786
from log2action to CSV...................................793, 794
from log2action to e-mail........................................795
from log2action to script...........................................797
from log2action to SNMP.........................................794
from log2action to syslog.........................................796
from log2action to XML.............................................793
exporting security policies.................................................513
extended information for custom attack
object.....................................................................................341
extended port mode.....................................................114, 119
external references for custom attack object............341
external user groups...........................................................400
external users........................................................................556
extranet devices
adding...............................................................................150
F
failover
forcing on device interface.......................................301
false positive setting...........................................................343
filter
VPN...................................................................................681
filtering logs using ranges..................................................760
filters
negation..........................................................................758
setting a byte range filter...........................................761
setting a category filter..............................................758
Index
953

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network and security manager 2010.3

Table of Contents